Infolinks In Text Ads

Why Blogger

Sample PaperProfile of the company Written TestAt the moment we have just one paper of Hughes Software. The paper is technical based with a question or two of probabilty thrown in. Subjects stressed are Operating Systems, Data Structures, C Programming, Communications etc. We have given a rough idea on the kind of paper that you can expect. We are not providing you with the inputs of the interview for this company - but we hope to add it very shortly.Sample Paper1 Sample Paper2

 ProfileHughes Software Systems (HSS), the #1 Communications Software company in India, offers the full spectrum of communications related software services, products and solutions. With over 40 customers spread over the Americas, Europe and Asia, HSS focuses on providing solutions to Telecom/ Datacom Equipment Manufacturers, System Integrators and Communication Services Providers.Setup in the year 1992, it is headquartered in a state-of-the-art campus in Electronic City, a New Delhi suburb. HSS has a dedicated Internet and ECommerce development center in Bangalore, the Silicon Valley of India.Continued significant investments in R&D have positioned HSS at the forefront of emerging communication technologies. The focus areas are Communication Protocols, Wireless Networks, Telecom/ Data Networks, Next Generation Networks, Intelligent Networks, Network Management, Internet and E-commerce.Based on its strong expertise in all communication technologies and applications, HSS is involved in the design and development of Switching Systems, Mobile Satellite Communication Systems, Cellular Infrastructure, Access Networks, Enterprise Networking Solutions, Network Management Solutions, VoIP Solutions and E-Commerce and Internet based systems.

For more information about this company visit their homesite at www.hssworld.com

Hughes Sample Paper #1

Sample Test Paper #1

1. Find the probability of getting a number with 7 between 100 and 999 (both inclusive).

2. There are 10 items in a box, out of which 3 are defective. 2 balls are taken one after the other. What is the probability that both of them are defective?

3. Context free grammar is accepted bya) finite automatab) push down automatac) two way bounded automatad) both b and c

5. Simplify the Karnaugh map given below and derive its expression in SOP form-11-

1--1

1--1

-11-

6. Question on NAND gates implementation.

7. Definition of Context Sensitive Grammar

8. An identifier can start with a letter followed by any number of letter or digits .

9. With the following configuration: 8MB total memory, 256kb cache , 4kb is block size. Using direct mapping, how many different physical memory blocks can be mapped on to the cache.(a) 64 (b) 256 (c) 128

10. CSMA/CD is used ina) token ringb) FDDIc) ethernet

11. In TCP/IP header, checksum containsa) sum of all the wordsb) ones complement of the datac) ones complement of the sum of all the wordsd) ones complement of the sum in ones complement

12. What is the maximum number of acknowledgements for a 4 bit sequence number in a sliding window protocol.

13. Which is a good way of representing varaibles in recursiona) local variablesb) static varaiblesc) global variables

14. Given the following c programfunc(){static int i = 10;printf("%d",i);i++;}What is the value of i if the function is called twice ?

24. Order of deleting a node from a linked list. (pointer is to an arbitrary node)a)0(1)b)0(n)

25. A choclate of size nXn is given and is to be made into pices of size 1x1. At a time both horizontal and a vertical cut is done. Find the order of complexitya) O(n2)b) O(nlogn)c) O(logn)

26. A directed graph is represented by adjacency list. To find the complexity of indegree of the node. e - edge n- vertices

27) No of leaf nodes given. find the no of nodes with degree 2.

28) AX = B. A is mXn and B is mX1a) there is a unique solution if rank of A is same as rank of augumented matrix [A b]b) there are multiple solutions

29. LXI sp,2099h LXI b, 2012h PUSH b

30. A and B are sets.A's cardinality is m and B's is n where m <> runningb) blocked: ready -> running

36. For converting infix expression to postfix what do we requirea) operand stackb) operator stack

37. 0 is reprented as both and negative and positive ina) ones complementb) twos complementc) two's complement has extra negative number

38. What is the difference between c and c++?a)In c++ we can define variables in the middleb)dynamic scoping

39. Which of the following is correcta) Synchronous tranmission needs more badwidth than Asychronous.b) Inasychronous transmission , the time is associated with data itself.....Hughes Sample Paper #2

1. There was a circuit given using three nand gates with two inputs and one output. Find the output.a) ORb) ANDc) XORd) NOTAns. (a)

2. Suggest a sorting algorithm which is efficient (in worst case) to 10 valuesa) Binary treeb) Selectionc) Bubbled) Any of the above

3. What is the number of comparisons in the worst case to merge two sorted lists containing n elements each.a) 2nb) 2n-1c) 2n+1d) 2n-2

4.Iintegrated check value(ICV) are used as:Ans. The client computes the ICV and then compares it with the senders value.

5. Question on client-server system using asychronous request from the client6. If a binary tree is constructed using nodes with two pointers each, how many null pointers does a tree with N nodes havea) n-1b) nc) n+1d) Depends on the number of edges

7. Which of following statements about heap is wronga) An n element heap has height log n(base of log is 2)b) Smallest element of heap is always a leafc) A array in reverse sorted order is a heapd) A heap can't contain any element more than once

13. X:verification' asks are we building the right product Y:validation' asks are we building the product right

14. Which one of the following can't be used to find an internet address given the domain namea) /etc/hostb) NIS yellow pagesc) DNSd) ARP15. Flow control is necessary for the transport protocol layer due to the following reasonsa) Unreliable linkb) Congestion at receiverc) Packets out of sequenced) None of these

16. In public key encryption, if A wants to send a message to B so that no one else can read the message then A encrypts the message usinga) A's public keyb) A's private keyc) B's public keyd) B's private key

17. Which of the following is not condition having a deadlock resource previous granted can be forcebly taken away from a processa) Resources need to be used in mutually exclusion fashionb) Process can request new resources, as they continue to hold on to old onesc) Here is a cycle in the resource allocation graph

16. An IP/IPX packet received by a computer using... having IP/IPX both how the packet is handled.Ans. Read the, field in the packet header with to send IP or IPX protocol.

17. The range of the 32 bit number in two's complement form is _______